{"schema_version":"1.7.2","id":"OESA-2026-2335","modified":"2026-05-15T14:02:24Z","published":"2026-05-15T14:02:24Z","upstream":["CVE-2026-33846","CVE-2026-3833","CVE-2026-42009","CVE-2026-42010","CVE-2026-42013","CVE-2026-42014","CVE-2026-42015","CVE-2026-5260","CVE-2026-5419"],"summary":"gnutls security update","details":"GnuTLS is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols as well as APIs to parse and write X.509, PKCS #12, and other required structures. The project strives to provide a secure communications back-end, simple to use and integrated with the rest of the base Linux libraries. A back-end designed to work and be secure out of the box, keeping the complexity of TLS and PKI out of application code.\r\n\r\nSecurity Fix(es):\n\nA heap buffer overflow vulnerability exists in the DTLS handshake fragment reassembly logic of GnuTLS. The issue arises in merge_handshake_packet() where incoming handshake fragments are matched and merged based solely on handshake type, without validating that the message_length field remains consistent across all fragments of the same logical message. An attacker can exploit this by sending crafted DTLS fragments with conflicting message_length values, causing the implementation to allocate a buffer based on a smaller initial fragment and subsequently write beyond its bounds using larger, inconsistent fragments. Because the merge operation does not enforce proper bounds checking against the allocated buffer size, this results in an out-of-bounds write on the heap. The vulnerability is remotely exploitable without authentication via the DTLS handshake path and can lead to application crashes or potential memory corruption.(CVE-2026-33846)\n\nA flaw was found in gnutls. This vulnerability occurs because gnutls performs case-sensitive comparisons of `nameConstraints` labels, specifically for `dNSName` (DNS) or `rfc822Name` (email) constraints within `excludedSubtrees` or `permittedSubtrees`. A remote attacker can exploit this by crafting a leaf certificate with casing differences in the Subject Alternative Name (SAN), leading to a policy bypass where a certificate that should be rejected is instead accepted. This could result in unauthorized access or information disclosure.(CVE-2026-3833)\n\n(CVE-2026-42009)\n\nA flaw was found in gnutls. Servers configured with RSA-PSK (Rivest–Shamir–Adleman – Pre-Shared Key) wrongfully matched usernames containing a NUL character with truncated usernames. A remote attacker could exploit this by sending a specially crafted username, leading to an authentication bypass. This vulnerability allows an attacker to gain unauthorized access by circumventing the authentication process.(CVE-2026-42010)\n\n(CVE-2026-42013)\n\n(CVE-2026-42014)\n\n(CVE-2026-42015)\n\n(CVE-2026-5260)\n\n(CVE-2026-5419)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS-SP3","name":"gnutls","purl":"pkg:rpm/openEuler/gnutls&distro=openEuler-24.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.8.2-14.oe2403sp3"}]}],"ecosystem_specific":{"aarch64":["gnutls-3.8.2-14.oe2403sp3.aarch64.rpm","gnutls-dane-3.8.2-14.oe2403sp3.aarch64.rpm","gnutls-debuginfo-3.8.2-14.oe2403sp3.aarch64.rpm","gnutls-debugsource-3.8.2-14.oe2403sp3.aarch64.rpm","gnutls-devel-3.8.2-14.oe2403sp3.aarch64.rpm","gnutls-utils-3.8.2-14.oe2403sp3.aarch64.rpm"],"noarch":["gnutls-help-3.8.2-14.oe2403sp3.noarch.rpm"],"src":["gnutls-3.8.2-14.oe2403sp3.src.rpm"],"x86_64":["gnutls-3.8.2-14.oe2403sp3.x86_64.rpm","gnutls-dane-3.8.2-14.oe2403sp3.x86_64.rpm","gnutls-debuginfo-3.8.2-14.oe2403sp3.x86_64.rpm","gnutls-debugsource-3.8.2-14.oe2403sp3.x86_64.rpm","gnutls-devel-3.8.2-14.oe2403sp3.x86_64.rpm","gnutls-utils-3.8.2-14.oe2403sp3.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2335"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33846"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-3833"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-42009"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-42010"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-42013"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-42014"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-42015"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5260"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5419"}],"database_specific":{"severity":"Critical"}}
